期刊文献+

基于移动代理的分布式入侵检测系统的研究 被引量:2

Research of Mobile Agent-Based Distributed Intrusion Detection System
下载PDF
导出
摘要 目前的分布式入侵检测系统存在单点失效、网络带宽占用高、扩展性不强等缺点。文中针对这些缺点提出了一种基于移动代理的分布式入侵检测系统模型。该系统运用移动代理作为各种入侵的独立检测实体到主机监控代理上收集数据并聚集、关联这些数据,这使得系统减小了数据传输量、分散了计算,同时也提高了系统的可扩展性。着重讨论了系统部件失效的检测和自动恢复机制,使系统更加稳定可靠。对实验结果分析表明这种结构很好地减少了带宽的占用,容易对新的攻击进行扩展,失效的代理也能自动准确地恢复。 Currently,distributed intrusion detection models had some impediments as single point failure, overload parts of network and non - scalable. In this paper, a mobile agent - based distributed system is proposed. The new model uses a set of software entities called mobile agents that can move from one node to another node within a network, and perform the task of aggregation and correlation of the intrusion related data that it receives from another set of software entities called the host monitor agent. It reduces network bandwidth usage by moving data analysis computation to the location of the intrusion data, and offers more flexibility. In addition,particularly discusses how to enhance the stability and reliability of this system by accomplishing self- recovery from internal failures. Based on analysis and experimental values,conclude that this system can reduce network bandwidth usage,add agents for new attack easily and recover the internal failures with itself.
出处 《计算机技术与发展》 2009年第9期132-135,共4页 Computer Technology and Development
关键词 入侵检测 移动代理 网络安全 分布式系统 intrusion detection mobile agents network security distributed systems
  • 相关文献

参考文献5

二级参考文献28

  • 1徐峰,宋如顺,赵洁,刘林强.基于P2P多Agent数据融合入侵检测模型研究[J].计算机工程与应用,2004,40(17):159-161. 被引量:3
  • 2何新贵.知识处理与专家系统[M].北京:国防工业出版社,1996..
  • 3Chen S M, Ke J S, Chang J F. Knowledge Representation Using Fuzzy Petri Nets. IEEE Transa. Knowledge and Data Engineering, 1990, 2(3):311-319
  • 4Luo Jianxiong, Bridgest S M.Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection. International Journal of Intelligent Systems, 2000, 15:687-703
  • 5范明 孟小峰.数据挖掘:概念与技术[M].北京:机械工业出版社,2001..
  • 6王永庆.人工智能原理与方法[M].西安:西安交通大学出版社,2002.54—58.
  • 7Lee W,Stolfo S J,Mok K W.A data mining framework for building intrusion detection models[A].In Proceedings of the 1999 IEEE Symposium on Security and Privacy[C].Oakland,CA:[s.n.],1999.
  • 8Lee W,Stolfo S J.Data mining approaches for intrusion detection[A].In Proceedings of the 7th USENIX Security Symposium[C].San Antonio,TX:[s.n.],1998.
  • 9Chan P K,Stolfo S J.Toward parallel and distributed learning by meta-learning[A].In AAAI Workshop in Knowledge Discovery in Databases[C].[s.l.]:[s.n.],1993.227-240.
  • 10Anderson J P.Computer Security Threat Monitoring and surveillance[R].[s.l.]:James P Anderson Co.,1980.

共引文献37

同被引文献21

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部